Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer science
biblio
Adversarial Authorship, Interactive Evolutionary Hill-Climbing, and Author CAAT-III
Submitted by grigby1 on Mon, 03/19/2018 - 1:37pm
Adversarial Authorship
Adversarial Stylometry
Artificial Intelligence
AuthorWebs
Blogs
computer science
feature extraction
Fingerprint recognition
Human behavior
Interactive Evolutionary Hill-Climbing
Metrics
pubcrawl
stylometry
testing
Writing
biblio
Models of Information Security Risk Accounting in Metrics of Dynamic Routing Protocols
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
pubcrawl
transmitted information
Telecommunications
security
Routing protocols
routing metrics
Routing
Resiliency
resilience
quality of service
QoS indicators
composability
Metrics
Measurement
information security risk indicator
information security risk accounting
information security risk
dynamic routing protocols
dynamic networks
computing metrics
computer science
computer network security
biblio
Models of Information Security Risk Accounting in Metrics of Dynamic Routing Protocols
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
pubcrawl
transmitted information
Telecommunications
security
Routing protocols
routing metrics
Routing
Resiliency
resilience
quality of service
QoS indicators
composability
Metrics
Measurement
information security risk indicator
information security risk accounting
information security risk
dynamic routing protocols
dynamic networks
computing metrics
computer science
computer network security
biblio
High-Level Online User Attribution Model Based on Human Polychronic-Monochronic Tendency
Submitted by grigby1 on Mon, 03/05/2018 - 1:03pm
logistic model tree
user interfaces
user identification process
user attribution model
UML behavioral modeling style
Training
temporal model
social network profiling process
Servers
Sea measurements
Scalability
pubcrawl
Polyphasia tendency
policy-based governance
online user attribution process
online profiling process
1-to-N User identification
internet
human preference
human polyphasia tendency
human polychronic-monochronic tendency
human inherent dynamics
Human Factors
Human behavior
forensic identification and profiling process
feature extraction
e-learning profiling process
computer science
collaboration
biometrics (access control)
Behavioral biometrics
attribute-based encryption
biblio
A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
outsourcing
verification codes
verifiable single keyword top-k search scheme
Top-k
Servers
security of data
security issues
Scalability
resource outsourcing
Resiliency
pubcrawl
Protocols
big data security in the cloud
Metrics
Keyword search
integrity verification
insider attacks
existing secure keyword search methods
Data models
data integrity
computer science
cloud servers
cloud data
Cloud Computing
biblio
Measuring Personality for Automatic Elicitation of Privacy Preferences
Submitted by grigby1 on Tue, 02/06/2018 - 1:43pm
personality trait
web applications
user privacy preferences
user personality traits
user connectivity
Scalability
Resiliency
pubcrawl
psychology
privacy protection
privacy preference
privacy
Policy
big data privacy
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
intelligent privacy management systems
Human Factors
Electronic mail
data privacy
Data collection
cultural differences
computer science
Big-Five personality traits
biblio
On collision-free reinforced barriers for multi domain IoT with heterogeneous UAVs
Submitted by grigby1 on Fri, 02/02/2018 - 1:20pm
collision avoidance
computer science
cyber physical systems
Human behavior
Human Factors
Internet of Vehicles
Metrics
Monitoring
pubcrawl
Resiliency
sensors
smart cities
Unmanned Aerial Vehicles
wireless sensor networks
biblio
RicherPicture: Semi-automated cyber defence using context-aware data analytics
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
Resiliency
Electronic mail
incident response strategy
information
learning (artificial intelligence)
nonnetwork data
operational aspects
organisation
organisational data
pubcrawl
decision-making process
RicherPicture
security
security of data
Security Operation Centre environment
synthetic scenarios
technological developments
threat intelligence data
tools
visual analytics
correlating network data
attack-trend data
automated network defences
automated network-defence actions
Automated Response Actions
Business
composability
Computer crime
computer science
context-aware data analytics
attack-surface
cyber attacks detection
cyber attacks prevention
Cyber defence
cyber-threat landscape
data analysis
data sources
data visualisation
Decision Making
biblio
TTLock: Tenacious and traceless logic locking
Submitted by grigby1 on Tue, 01/23/2018 - 3:24pm
IP piracy
TTLock
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
Policy
logic locking
IP piracy revention
collaboration
Interference
intellectual property protection technique
intellectual property
industrial property
Foundries
computer science
Computers
Computer crime
composability
biblio
A novel SVD and online sequential extreme learning machine based watermark method for copyright protection
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
learning (artificial intelligence)
watermarking scheme
Watermarking
watermarked image
Training
tools
SVD
singular value decomposition
Resiliency
pubcrawl
PSNR
policy-based governance
Policy
OSELM
original host image
online sequential extreme learning machine based watermark method
BER
IWT domain
IWT
ip protection
intellectual property
image watermarking
Image coding
Electronic mail
discrete wavelet transforms
copyright protection
copyright
computer science
composability
collaboration
blind digital watermark algorithm
Bit error rate
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »